Most Popular
1. It’s a New Macro, the Gold Market Knows It, But Dead Men Walking Do Not (yet)- Gary_Tanashian
2.Stock Market Presidential Election Cycle Seasonal Trend Analysis - Nadeem_Walayat
3. Bitcoin S&P Pattern - Nadeem_Walayat
4.Nvidia Blow Off Top - Flying High like the Phoenix too Close to the Sun - Nadeem_Walayat
4.U.S. financial market’s “Weimar phase” impact to your fiat and digital assets - Raymond_Matison
5. How to Profit from the Global Warming ClImate Change Mega Death Trend - Part1 - Nadeem_Walayat
7.Bitcoin Gravy Train Trend Forecast 2024 - - Nadeem_Walayat
8.The Bond Trade and Interest Rates - Nadeem_Walayat
9.It’s Easy to Scream Stocks Bubble! - Stephen_McBride
10.Fed’s Next Intertest Rate Move might not align with popular consensus - Richard_Mills
Last 7 days
Stocks Correct into Bitcoin Happy Thanks Halving - Earnings Season Buying Opps - 4th July 24
24 Hours Until Clown Rishi Sunak is Booted Out of Number 10 - UIK General Election 2024 - 4th July 24
Clown Rishi Delivers Tory Election Bloodbath, Labour 400+ Seat Landslide - 1st July 24
Bitcoin Happy Thanks Halving - Crypto's Exist Strategy - 30th June 24
Is a China-Taiwan Conflict Likely? Watch the Region's Stock Market Indexes - 30th June 24
Gold Mining Stocks Record Quarter - 30th June 24
Could Low PCE Inflation Take Gold to the Moon? - 30th June 24
UK General Election 2024 Result Forecast - 26th June 24
AI Stocks Portfolio Accumulate and Distribute - 26th June 24
Gold Stocks Reloading - 26th June 24
Gold Price Completely Unsurprising Reversal and Next Steps - 26th June 24
Inflation – How It Started And Where We Are Now - 26th June 24
Can Stock Market Bad Breadth Be Good? - 26th June 24
How to Capitalise on the Robots - 20th June 24
Bitcoin, Gold, and Copper Paint a Coherent Picture - 20th June 24
Why a Dow Stock Market Peak Will Boost Silver - 20th June 24
QI Group: Leading With Integrity and Impactful Initiatives - 20th June 24
Tesla Robo Taxis are Coming THIS YEAR! - 16th June 24
Will NVDA Crash the Market? - 16th June 24
Inflation Is Dead! Or Is It? - 16th June 24
Investors Are Forever Blowing Bubbles - 16th June 24
Stock Market Investor Sentiment - 8th June 24
S&P 494 Stocks Then & Now - 8th June 24
As Stocks Bears Begin To Hibernate, It's Now Time To Worry About A Bear Market - 8th June 24
Gold, Silver and Crypto | How Charts Look Before US Dollar Meltdown - 8th June 24
Gold & Silver Get Slammed on Positive Economic Reports - 8th June 24
Gold Summer Doldrums - 8th June 24
S&P USD Correction - 7th June 24
Israel's Smoke and Mirrors Fake War on Gaza - 7th June 24
US Banking Crisis 2024 That No One Is Paying Attention To - 7th June 24
The Fed Leads and the Market Follows? It's a Big Fat MYTH - 7th June 24
How Much Gold Is There In the World? - 7th June 24
Is There a Financial Crisis Bubbling Under the Surface? - 7th June 24

Market Oracle FREE Newsletter

How to Protect your Wealth by Investing in AI Tech Stocks

Keeping Your Cryptos Safe From Crooks

Currencies / BlockChain Nov 23, 2017 - 12:33 PM GMT

By: Avi_Gilburt

Currencies

In our first article together, Ryan and I spoke about how to start making your first crypto currency purchases. We now want to address security. While neither of us are computer security experts, we have subscribers that are. They have helped form our thinking.

We suggest using this article to jumpstart the process of getting your digital assets secure. If you are interested in the crypto space, please make security your top concern. While our article is elementary, we provide some links we found helpful.

We also hope this article generates lively discussion. If there is any further security information of which you believe we should be aware, please feel free to post your comments below.


Why So Vulnerable?

First, we need to address a myth that still exists regarding the blockchain. Using current technology, the blockchain is not hackable or corruptible. Once a transaction exists on the blockchain, it is immutable. Today, hacks are not perpetrated against the blockchain. Rather, users or organizations are the vulnerable ones.

If an account or wallet is accessed by a hacker in such a way that they can create transactions instead of the owner, one’s coins become completely vulnerable. The decentralized and borderless nature of cryptos, which is normally a benefit, is also their greatest vulnerability. A hacker may simply move coins to an address they control, and those coins will never be found again. No one is party to the transaction but the owner and the hacker so the owner may be left to fend for himself.

Forms of Attack

There are two big categories of attack to watch out for. The ‘inside job’ is where an exchange is hacked, usually with the help of an employee. The more common attack is a direct user attack, where a user is compromised, usually via the stealing of credentials for an online exchange, or exposure of their private keys.

We hear most about direct user attacks, and two of our subscribers have been hacked, and have lost their funds.

A common way a user is compromised involves getting a user to enter their credentials and 2nd factor authentication into a fake website. A bot captures that info and instantly logs into the real site, disables the two-factor authentication (if they have it), and liquidates the account before the two-factor authentication expires.

Key logging viruses may also track a user’s credentials when they logon to a legitimate site. This requires a direct compromise of the user’s computer or device.

Finally a copy and paste virus that infects a computer a convert a crypto address pasted at the time a user sends cryptos, causing the user to send coin to the attacker’s address.

Getting Secure

Here are the basic “musts” of good security. If you are diligent with these, you can avoid most direct user hacks:

“Keep clean.” Given the above noted potential attacks, keep your computer free of viruses, and you’ll win half the battle. Some users we know including Ryan, have a separate machine to make trades online and never installs any software beyond the browser on that trading computer. A chromebook is a good cheap option for $150-250. If you are a techy person, you might consider the use of a virtual machine on your computer.

Use difficult and unique passwords for all crypto related sites and software. Many people use passwords that are quite easy to hack. Consider using over 10 digits, with symbols, numbers, and caps. Consider changing passwords regularly, say every 30 days.

Always use two-factor authentication (2FA) on all crypto trading sites. Always copy the private keys exchanges provide you when you start 2FA, which allows you to restore your authenticator on another device. The common 2FA apps are Authy and Google Authenticator.

Do not use your phone number as a recovery source for any email or authentication app tied to a crypto account. Security at cellular carriers is too lax and the Equifax hack raises the risk that your private information will allow hackers to take control of your phone number.

When copying and pasting a crypto address for sending assets to other addresses, double check the address. There are viruses that hijack the copy and paste function so you enter a crypto address that doesn’t belong to you, sending coins to the hacker.

Once you’ve started an account somewhere, bookmark the site and only go to the site through that bookmark. Never hit a link in an email, and be careful if hitting a link from a Google search. Double check the URL.

If you keep custody of funds, such as in a wallet app, always copy down your private keys. Put them on a thumbdrive or on paper and in a secure location. This will allow you to restore funds if your machine goes down.

Ryan has half of each key encrypted on two separate cloud storage services in the event he loses his offline version.

Finally, the Hardware wallet is a very good approach to security. Trezor and Ledger are the leading brands. They hold the private keys encrypted in the hardware, and can be unplugged from your device. They are not easy to use, so you might choose to keep your actively traded funds on an exchange. However keeping your long term holdings away from hackers on a hardware wallet is a good idea.

Conclusion

Trading crypto currencies is very rewarding financially, but due to their decentralized and borderless nature, you have to be the one responsible for your own security. This extra effort does keep the less tech savy out of the market.

Additional Links:

There is more you can do. For more advanced topics in security, here are some links we found helpful:

Advanced password technique:

How to Build a (Nearly) Hack-Proof Password System with LastPass and a Thumb Drive

Regarding the issue with carriers:

Here's How an Attacker Can Bypass Your Two-Factor Authentication

Recovery codes for Authenticator:

What Happens If I Use Two-Factor Authentication and Lose My Phone?

Thoughts on CNBC:

This is how you can protect your cryptocurrencies from hackers

Avi Gilburt is a widely followed Elliott Wave technical analyst and author of ElliottWaveTrader.net (www.elliottwavetrader.net), a live Trading Room featuring his intraday market analysis (including emini S&P 500, metals, oil, USD & VXX), interactive member-analyst forum, and detailed library of Elliott Wave education.

© 2017 Copyright Avi Gilburt - All Rights Reserved Disclaimer: The above is a matter of opinion provided for general information purposes only and is not intended as investment advice. Information and analysis above are derived from sources and utilising methods believed to be reliable, but we cannot accept responsibility for any losses you may incur as a result of this analysis. Individuals should consult with their personal financial advisors.


© 2005-2022 http://www.MarketOracle.co.uk - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.


Post Comment

Only logged in users are allowed to post comments. Register/ Log in